Data Security: Whose Job Is It Really? Forrester has a recommendation for CISOs struggling with how to secure corporate data... Cisco readies for Conficker worm The April 1 attack of the Conficker worm might just be an April Fool's prank, but Cisco isn't taking any chances -- its Threat operations Center will be monitoring the situation in the event that there is an actual attack. 3 Ways Pen Testing Helps DLP (and 2 Ways It Doesn't) Penetration testing's future has been caught in heated debate recently, sparked by Fortify Co-Founder and Chief Scientist Brian Chess' prediction that the practice would die off this year. Smart grid, other environmental control systems not smart about security If lengthy requirements were a measure of success, then smart grid technology is well on its way to being an anomaly in the environmental controls space. But I'm not going to try to hold my breath for that to happen. FAA exec offers blunt, scary assessment of its network security Its not often you hear a highly placed IT executive dump on his own network security let alone a person entrusted with as much riding on such a systems as the Federal Aviation Administration. FBI: Computer crime cost $265M in 2008, an all-time high Online fraud and other computer schemes cost the U.S. $265 million - up from $239 million in 2007 or an average of average individual loss was $931. The FBI said 275,284 complaints were received in 2008 by the Internet Crime Complaint Center (IC3), and the National White Collar Crime Center (NW3C), up from 206,884 (33%) over 2007. How to land a security sales engineering job Cisco Subnet blogger Jamey Heary has filled many different roles during his IT career. Find out why he thinks a security sales engineering position is the place to be right now. Researchers exploit Conficker flaw to find infected PCs Just days before the Conficker worm is set to contact its controllers for new instructions, security researchers have discovered a flaw in the worm that makes it much easier for users to detect infected PCs. Smart grid, other environmental control systems not smart about security If lengthy requirements were a measure of success, then smart grid technology is well on its way to being an anomaly in the environmental controls space. But I'm not going to try to hold my breath for that to happen. GhostNet highlights evolving threat environment The high-profile disclosure over the weekend of the GhostNet cyberespionage ring that targeted 1,295 computers in more than 100 countries underscores how highly targeted and sophisticated attacks, often run by criminals, are changing the security landscape, according to a security researcher at Symantec. Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one. Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment